CVE-2024-31983

9.9 CRITICAL

📋 TL;DR

This vulnerability in XWiki Platform allows users with edit rights to modify translations without proper authorization, bypassing script or admin rights normally required. If exploited, it can lead to remote code execution when translation values aren't properly escaped. Affects XWiki installations with multilingual features enabled.

💻 Affected Systems

Products:
  • XWiki Platform
Versions: 4.3-milestone-2 up to but excluding 14.10.20, 15.5.4, and 15.10-rc-1
Operating Systems: All platforms running XWiki
Default Config Vulnerable: ⚠️ Yes
Notes: Requires multilingual wikis with translations feature enabled. Users only need edit rights on documents containing translations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Unauthorized content modification, privilege escalation, or limited code execution within the XWiki context.

🟢

If Mitigated

Only authorized users can edit translations, preventing unauthorized modifications and code execution.

🌐 Internet-Facing: HIGH - Web-accessible XWiki instances are directly exploitable by attackers with edit rights.
🏢 Internal Only: HIGH - Internal users with edit rights can exploit this vulnerability to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires edit rights but exploitation is straightforward once access is obtained.

Exploitation requires authenticated user with edit rights. The vulnerability bypasses authorization checks for translation editing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.10.20, 15.5.4, or 15.10RC1

Vendor Advisory: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xxp2-9c9g-7wmj

Restart Required: Yes

Instructions:

1. Backup your XWiki installation and database. 2. Download patched version from xwiki.org. 3. Follow XWiki upgrade documentation for your version. 4. Restart XWiki service. 5. Verify upgrade completed successfully.

🔧 Temporary Workarounds

Restrict edit rights on translation documents

all

Limit edit permissions on documents containing translations to prevent unauthorized users from exploiting the vulnerability.

Use XWiki rights management interface to restrict edit rights on translation documents

🧯 If You Can't Patch

  • Implement strict access controls to limit edit rights on all documents, especially those containing translations.
  • Monitor and audit all translation modifications for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check XWiki version via Admin > About page or by examining xwiki.cfg file. If version is between 4.3-milestone-2 and before 14.10.20/15.5.4/15.10RC1, system is vulnerable.

Check Version:

Check Admin > About page in XWiki web interface or examine ${xwiki.home}/xwiki.cfg file

Verify Fix Applied:

After patching, verify version shows 14.10.20, 15.5.4, or 15.10RC1 or higher. Test that users with only edit rights cannot modify translations without proper authorization.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized translation modifications
  • Script execution attempts in translation fields
  • Unusual edit patterns on translation documents

Network Indicators:

  • POST requests to translation edit endpoints from unauthorized users

SIEM Query:

source="xwiki.log" AND ("translation" OR "script") AND ("edit" OR "modify") AND user NOT IN (authorized_users)

🔗 References

📤 Share & Export